• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 22
  • 3
  • 3
  • 3
  • 3
  • 3
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 32
  • 32
  • 32
  • 32
  • 20
  • 18
  • 15
  • 15
  • 14
  • 10
  • 9
  • 7
  • 6
  • 6
  • 6
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
11

Protection of personal information in the South African cloud computing environment: a framework for cloud computing adoption

Skolmen, Dayne Edward January 2016 (has links)
Cloud Computing has advanced to the point where it may be considered an attractive proposition for an increasing number of South African organisations, yet the adoption of Cloud Computing in South Africa remains relatively low. Many organisations have been hesitant to adopt Cloud solutions owing to a variety of inhibiting factors and concerns that have created mistrust in Cloud Computing. One of the top concerns identified is security within the Cloud Computing environment. The approaching commencement of new data protection legislation in South Africa, known as the Protection of Personal Information Act (POPI), may provide an ideal opportunity to address the information security-related inhibiting factors and foster a trust relationship between potential Cloud users and Cloud providers. POPI applies to anyone who processes personal information and regulates how they must handle, store and secure that information. POPI is considered to be beneficial to Cloud providers as it gives them the opportunity to build trust with potential Cloud users through achieving compliance and providing assurance. The aim of this dissertation is, therefore, to develop a framework for Cloud Computing adoption that will assist in mitigating the information security-related factors inhibiting Cloud adoption by fostering a trust relationship through compliance with the POPI Act. It is believed that such a framework would be useful to South African Cloud providers and could ultimately assist in the promotion of Cloud adoption in South Africa.
12

Advance passenger information passenger name record : privacy rights and security awareness

Banerjea-Brodeur, Nicolas Paul January 2003 (has links)
No description available.
13

An empirical study of the impact of the Personal Data (Privacy) Ordinance on human resource management.

January 1998 (has links)
by Fung Cheuk-Hing, Wang Suk-Ching Anita. / Thesis (M.B.A.)--Chinese University of Hong Kong, 1998. / Includes bibliographical references (leaves 87-89). / ABSTRACT --- p.ii / TABLE OF CONTENTS --- p.iii / LIST OF TABLES --- p.vi / LIST OF ABBREVIATIONS --- p.vii / ACKNOWLEDGMENT --- p.viii / Chapter / Chapter I. --- INTRODUCTION --- p.1 / Chapter II. --- LITERATURE REVIEW --- p.4 / Privacy Protection Act --- p.4 / A Survey of Privacy in the Workplace --- p.5 / Chapter III. --- PERSONAL DATA (PRIVACY) ORDINANCE --- p.8 / Events that led to the Enactment of the Ordinance --- p.8 / An Overview of the Ordinance --- p.10 / Chapter IV. --- METHODOLOGY --- p.14 / Chapter V. --- RESULTS --- p.17 / Privacy Commissioner's Office (PCO) --- p.17 / The Hong Kong Institute of Human Resource Management (IHRM) --- p.23 / Bank A --- p.26 / Recruitment and Selection --- p.26 / References --- p.27 / Employee Records --- p.28 / Data Relating to Ex-employees --- p.28 / Training and Development --- p.29 / Compensation and Benefits --- p.30 / Data Storage and Security --- p.30 / Data Transfer and Transmission --- p.30 / Appraisal and Potential Assessment --- p.30 / Disciplinary Records --- p.31 / Exit Interview --- p.31 / Others --- p.32 / Bank B --- p.33 / Recruitment and Selection --- p.33 / References --- p.34 / Employee Records --- p.34 / Data Relating to Ex-employees --- p.35 / Training and Development --- p.35 / Compensation and Benefits --- p.35 / Data Storage and Security --- p.35 / Data Transfer and Transmission --- p.36 / Appraisal and Potential Assessment/Disciplinary Records --- p.36 / Exit Interview --- p.36 / Others --- p.36 / Bank C --- p.37 / Recruitment and Selection --- p.38 / References --- p.38 / Employee Records --- p.38 / Data Relating to Ex-employees --- p.39 / Training and Development --- p.39 / Compensation and Benefits --- p.39 / Data Storage and Security --- p.39 / Data Transfer and Transmission --- p.40 / Appraisal and Potential Assessment --- p.40 / Disciplinary Records --- p.40 / Exit Interview --- p.40 / Others --- p.41 / Chapter VI. --- ANALYSIS OF RESULTS --- p.43 / "Overview of Bank A, B and C's Interview Results" --- p.43 / Evaluation on Compliance Level --- p.45 / Recruitment and Selection --- p.46 / References --- p.47 / Employee Records --- p.48 / Data Relating to Ex-employees --- p.48 / Training and Development --- p.49 / Compensation and Benefits --- p.49 / Data Storage and Security --- p.50 / Data Transfer and Transmission --- p.50 / Appraisal and Potential Assessment/Disciplinary Records --- p.50 / Exit Interview --- p.50 / General --- p.50 / Dynamics Between the PCO and Human Resource Practitioners --- p.51 / Dynamics Between the PCO and IHRM --- p.53 / Dynamics Between IHRM and Human Resource Practitioners --- p.53 / Comparison with Linowes' Survey Results --- p.54 / Chapter VII. --- RECOMMENDATIONS --- p.56 / Privacy Commissioner's Office (PCO) --- p.56 / The Hong Kong Institute of Human Resource Management (IHRM) --- p.57 / "Bank A, B and C" --- p.57 / Chapter VIII. --- LIMITATIONS --- p.59 / IX. CONCLUSIONS --- p.60 / APPENDIX --- p.62 / BIBLIOGRAPHY --- p.87
14

Names, pseudonyms and anonymity in online interactions: a study of name policy on news24, the daily Maverick, and 4chan.

Donald, Katherine Faye January 2017 (has links)
A research report submitted to the Faculty of Arts, University of the Witwatersrand, Johannesburg, in partial fulfilment of the requirements for the degree of Master of Arts, Johannesburg, 2017 / This research investigates real names, pseudonyms, and anonymity online. From its small beginning as a research tool, the internet has grown radically and been increasingly incorporated into people’s daily lives. Simultaneously, as the internet has grown and changed, so have its uses, and perceptions of the naming practices used on it. Attitudes towards acceptable name use online have changed over time. Social networking sites have had a strong influence on name usage policies. This research examines how these attitudes have changed, and the implications of real names, pseudonyms and anonymity for behaviour on the internet and privacy. The radically disembodied nature of online communication lends itself to disinhibition, which in turn has resulted in online communications’ reputation for trolls and abusers. Contrary to the common assumption that the use of real names offline indicates the legitimacy of using real names online, online and offline communications are radically different. Online communications have very different considerations regarding privacy, identity theft, the digital footprint, and collapsed context, many of which are not present in offline communications. This paper examines naming policies and site structure through two case studies. The first case focuses on News24 and the Daily Maverick, both of which are South African news sites. Due to the need for rational and polite discourse, these implemented real name policies in order to enforce good behaviour amongst their users. In both cases, the real name policies failed. The second case study is that of 4chan, the American image board site. 4chan does not require any login process, and its users are typically anonymous. Despite being notorious for trolls, illegal content, and its image board /b/, the site’s architecture, along with the way that posts are created and then kept alive, mean that the site can be effective at moderating the kinds of content that it deems appropriate for each of its boards. Despite the contrasting nature and purposes of the news sites and 4chan, there are lessons to be learnt from the failure of real name policies, and the architecture and set up of sites which can be used to enforce particular behaviours. Furthermore, despite the ephemeral and shifting nature of 4chan, identity and a sense of belonging remain important to its users, hinting at the importance of a sense of identity to site members and the role of this identity in ensuring that users adhere to the norms. / XL2018
15

Transmission of copyrighted works over the internet : rights and exceptions

Tao, Hong Unknown Date (has links)
This thesis examines the balance between copyright owners and users by studying the nature of the rights and exceptions related to transmission of copyrighted works over the internet, focusing on three different jurisdictions: Australia, Japan and the United States.The choice of Japan and the United States is based on consideration of the following elements: 1. Both countries possess advanced information technology; 2. Both countries too the lead in legislating for copyright protection in the digital environment; 3. Both countries have different legal systems. In the matter of statutory reaction of transmission of works over the internet, there is no uniform solution around the world as the divergent laws in the three chosen countries demonstrate.
16

A comparative study of technological protection measures in copyright law

Conroy, Marlize 30 November 2006 (has links)
Digitisation had a profound impact on the creation, reproduction, and dissemination of works protected by copyright. Works in digital format are vulnerable to infringement, and technological protection measures are accordingly applied as protection. Technological protection measures can, however, easily be circumvented, and additional legal protection against circumvention was needed. Article 11 of the WIPO Copyright Treaty (the WCT) obliges Member States to provide adequate legal protection against the circumvention of technological measures applied to works protected by copyright. Contracting parties must refine the provisions of Article 11 and provide for exceptions on the prohibition. Article 11 does not specify whether it pertains to only certain types of technological measures, nor does it prohibit the trafficking in circumvention devices. The United States implemented the provisions of Article 11 of the WCT through the Digital Millennium Copyright Act of 1998 (the DMCA). Section 1201 of the DMCA prohibits the circumvention of technological measures. It is detailed and relates to two categories of technological measures - access control and copy control. It prohibits not only the act of circumvention, but also the trafficking in circumvention devices. Article 6 of the EC Directive on the Harmonisation of Certain Aspects of Copyright and Related Rights in the Information Society of 2001 implements Article 11 of the WCT. Article 6 seeks to protect Aeffective technological measures@. It prohibits both the act of circumvention and circumvention devices. Although Article 11 of the WCT is silent on the issue of access control, it seems as if the international trend is to provide legal protection to access controls, thus indirectly creating a right to control access. South Africa has not yet implemented Article 11 of the WCT. The South African Copyright Act of 1979 does not protect technological protection measures. The Electronic Communications and Transactions Act of 2002 (the ECT Act) provides protection against the circumvention of technological protection measures applied to digital data. The definition of Adata@ is such that it could include protected works. If applied to protected works, the anti-circumvention provisions of the ECT Act would be detrimental to user privileges. As developing country, it seems to be in South Africa's best interest to the implement the provisions of Article 11 in such a manner that it still allows users access to and legitimate use of works protected by copyright. / Jurisprudence / LL.D.
17

A comparative study of technological protection measures in copyright law

Conroy, Marlize 30 November 2006 (has links)
Digitisation had a profound impact on the creation, reproduction, and dissemination of works protected by copyright. Works in digital format are vulnerable to infringement, and technological protection measures are accordingly applied as protection. Technological protection measures can, however, easily be circumvented, and additional legal protection against circumvention was needed. Article 11 of the WIPO Copyright Treaty (the WCT) obliges Member States to provide adequate legal protection against the circumvention of technological measures applied to works protected by copyright. Contracting parties must refine the provisions of Article 11 and provide for exceptions on the prohibition. Article 11 does not specify whether it pertains to only certain types of technological measures, nor does it prohibit the trafficking in circumvention devices. The United States implemented the provisions of Article 11 of the WCT through the Digital Millennium Copyright Act of 1998 (the DMCA). Section 1201 of the DMCA prohibits the circumvention of technological measures. It is detailed and relates to two categories of technological measures - access control and copy control. It prohibits not only the act of circumvention, but also the trafficking in circumvention devices. Article 6 of the EC Directive on the Harmonisation of Certain Aspects of Copyright and Related Rights in the Information Society of 2001 implements Article 11 of the WCT. Article 6 seeks to protect Aeffective technological measures@. It prohibits both the act of circumvention and circumvention devices. Although Article 11 of the WCT is silent on the issue of access control, it seems as if the international trend is to provide legal protection to access controls, thus indirectly creating a right to control access. South Africa has not yet implemented Article 11 of the WCT. The South African Copyright Act of 1979 does not protect technological protection measures. The Electronic Communications and Transactions Act of 2002 (the ECT Act) provides protection against the circumvention of technological protection measures applied to digital data. The definition of Adata@ is such that it could include protected works. If applied to protected works, the anti-circumvention provisions of the ECT Act would be detrimental to user privileges. As developing country, it seems to be in South Africa's best interest to the implement the provisions of Article 11 in such a manner that it still allows users access to and legitimate use of works protected by copyright. / Jurisprudence / LL.D.
18

Privacidade, liberdade de expressão e proteção dos dados pessoais: uma perspectiva brasileira com base na jurisprudência do Supremo Tribunal Federal

Pupo, Alvaro de Carvalho Pinto 31 October 2017 (has links)
Submitted by Filipe dos Santos (fsantos@pucsp.br) on 2017-11-14T11:28:30Z No. of bitstreams: 1 Alvaro de Carvalho Pinto Pupo.pdf: 993019 bytes, checksum: 3e483a91d657e2658eb8b6b67b0a96f2 (MD5) / Made available in DSpace on 2017-11-14T11:28:30Z (GMT). No. of bitstreams: 1 Alvaro de Carvalho Pinto Pupo.pdf: 993019 bytes, checksum: 3e483a91d657e2658eb8b6b67b0a96f2 (MD5) Previous issue date: 2017-10-31 / This study analyzes the concept of intimacy, privacy, free speech and personal data under a brazilian perspective, as well as the protection for each of the itens mentioned. The study makes references to authorities, legislation and case law pertaining to each of the subjects. The study pursues the clarification of what each of these understands as privacy protection and personal data protection, and how these correlates. It also pursues to understand if these understandings are aligned and propose, in the end, some way of uniformization considering the legislative bill proposals being discussed in the Brazilian Congress / O presente trabalho analisa o conceito da intimidade, privacidade, liberdade de expressão e de dados pessoais sob uma perspectiva brasileira, bem como a proteção outorgada a cada um dos itens tratados acima. São analisados os pontos doutrinários, legais e jurisprudenciais associados com cada um deles. A análisa busca averiguar o que cada um desses campos entende como proteção da privacidade e dos dados pessoais e como a privacidade e dados pessoais se relacionam, além verificar se esses entendimentos estão alinhados e propor, ao final, uma forma de uniformização, considerando inclusive propostas legislativas que se encontram em debate no Congresso Nacional
19

Le couplage de données et la protection de la vie privée informationnelle sous l'article 8 de la Charte canadienne /

Arès, Sébastien January 2005 (has links)
No description available.
20

互聯網上泄露公民個人信息行為的犯罪化探析 : 以 人肉搜索 為視角 / 以 人肉搜索 為視角;"Analysis of criminalization on the disclosure of citizens' personal information on the Internet : from the human flesh search ";"Analysis of criminalization on the disclosure of citizens' personal information on the Internet : from the human

劉曉敏 January 2009 (has links)
University of Macau / Faculty of Law

Page generated in 0.2293 seconds